David Strom

David Strom writes and speaks about security, networking and communications topics for CSO Online, Network World, Computerworld, and other publications. He can be reached through his web site, or on Twitter @dstrom.

What is Mitre's ATT&CK framework? What red teams need to know

10 questions to answer before running a capture the flag (CTF) contest

10 questions to answer before running a capture the flag (CTF) contest

Running your own CTF contest can build security skills and help identify new internal and external talent. Learn what types of challenges you need to include, how to make the contest run smoothly, and other logistics to consider.

Mastering email security with DMARC, SPF and DKIM

Mastering email security with DMARC, SPF and DKIM

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.

10 cutting-edge tools that take endpoint security to a new level
Clear Choice Tests

10 cutting-edge tools that take endpoint security to a new level

The 10 products we tested in this review go beyond proactive monitoring and endpoint protection and look more closely at threats. They evaluate these threats in a larger ecosystem, combining the best aspects from network intrusion...

10 advanced endpoint protection tools

10 advanced endpoint protection tools

The days of simple endpoint protection based on traditional anti-malware tools are over. There are now advanced endpoint detection and response (EDR) tools that go beyond proactive monitoring and endpoint protection. Here are capsule...

7 trends in advanced endpoint protection
Clear Choice Tests

7 trends in advanced endpoint protection

After extensive testing of 10 advanced endpoint protection products, we have identified a series of broad industry trends.

Buyer’s Guide to 9 multi-factor authentication products

Buyer’s Guide to 9 multi-factor authentication products

The two-factor authentication market has moved toward what is now being called multi-factor authentication. One of the key features being new types of hardware-based tokens. Here are individual reviews of nine MFA products.

9-vendor authentication roundup: The good, the bad and the ugly
Clear Choice Tests

9-vendor authentication roundup: The good, the bad and the ugly

New ‘smart’ tokens and risk-based factors deliver tighter security, but setups remain complex and user interfaces need a facelift.

New endpoint security tools target zero-day attacks

New endpoint security tools target zero-day attacks

Most enterprises want an endpoint product that can prevent zero-day exploits and they want to be more proactive. We looked at two relatively new products, Carbon Black (now owned by Bit9) and Cylance Protect. Both are designed to...

Best tools for email encryption

Best tools for email encryption

The products we reviewed show good signs that encryption has finally come of age

Best tools for single sign-on

Best tools for single sign-on

Single mindednessSince we last looked at single sign-on products in 2012, the field has gotten more crowded and more capable. For this round of evaluations, we looked at seven SSO services: Centrify’s Identity Service, Microsoft’s...

These organizations will train, mentor and help you find your next job for free

Looking for a career change? These initiatives are committed to preparing you for a new job in the tech sector in your community

Load More